2012
DOI: 10.4156/jcis.vol2.issue3.6
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Code hiding Android APP's Distribution and Hacking Attacks and Incident Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
0
0
Order By: Relevance
“…Also, avoiding installing content from unsecured sites, and downloading and updating newer antivirus applications is the best protection method. Applications that do not request 'allow' should not be installed before verifying their security [26]. In addition, Java house three-dimensional coding tools were launched for protrusion tests among users.…”
Section: Introductionmentioning
confidence: 99%
“…Also, avoiding installing content from unsecured sites, and downloading and updating newer antivirus applications is the best protection method. Applications that do not request 'allow' should not be installed before verifying their security [26]. In addition, Java house three-dimensional coding tools were launched for protrusion tests among users.…”
Section: Introductionmentioning
confidence: 99%